Techniques for available bandwidth measurement in IP networks: A performance comparison

Size: px
Start display at page:

Download "Techniques for available bandwidth measurement in IP networks: A performance comparison"

Transcription

1 Computer Networks 50 (2006) Techniques for available bandwidth measurement in IP networks: A performance comparison Leopoldo Angrisani a, Salvatore DÕAntonio b, *, Marcello Esposito b, Michele Vadursi a a Dip. di Ingegneria Elettrica, Università di Napoli Federico II, Via Claudio 21, Napoli, Italy b CINI Consorzio Interuniversitario Nazionale per l Informatica, Via Diocleziano 328, Napoli, Italy Received 1 December 2004; received in revised form 19 May 2005; accepted 6 June 2005 Available online 1 August 2005 Responsible Editor: M. Crovella Abstract As the Internet grows in scale and complexity, the need for accurate traffic measurement increases. Among the different parameters relevant to traffic measurement, the paper pays attention to the available bandwidth of a path. In particular, a performance comparison of three different techniques, devoted to available bandwidth measurement, is attained under different operating conditions. The comparison is based on the outcomes of an extensive experimental activity. Experimental tests are not limited to the mere execution of the software tools that implement the techniques under test; indeed, a proper measurement station comprising a digital counter has been set up by the authors with the aim of gaining a reference value to be compared with results provided by the considered tools. The adoption of a performance evaluation methodology relying on the use of electronic instrumentation for time measurement represents a good example of crossfertilization between two distinct research areas: networking on one side and electronic measurements on the other. The tools have been tested under different cross-traffic conditions and their performance has been evaluated in terms of the following metrics: concurrence, repeatability, bias, and time. For each cross-traffic scenario and with reference to every performance metric, the paper identifies the tool that provides the best results. Furthermore, an optimal setting for the parameters of each tool has been identified thanks to the extensive experimental activity that has been performed. Ó 2005 Elsevier B.V. All rights reserved. Keywords: Available bandwidth; Communication network test and measurement; Performance evaluation; Cross-traffic * Corresponding author. Tel.: ; fax: addresses: angrisan@unina.it (L. Angrisani), salvatore.dantonio@napoli.consorzio-cini.it (S. DÕAntonio), marcello.esposito@napoli.consorzio-cini.it (M. Esposito), mvadursi@unina.it (M. Vadursi) /$ - see front matter Ó 2005 Elsevier B.V. All rights reserved. doi: /j.comnet

2 L. Angrisani et al. / Computer Networks 50 (2006) Introduction Traffic monitoring provides network operators with a detailed view of the state of their networks. In particular, congestions can be detected through periodic summaries of traffic load and packet loss on individual links; parts of the network exhibiting high delay or loss, as well as routing anomalies such as forwarding loops, can be identified by means of active probes between pairs of nodes in the network. Network operators can exploit results provided by the traffic measurement activity in order to perform fundamental tasks: (i) usagebased accounting, (ii) traffic profiling, (iii) traffic engineering and (iv) attack/intrusion detection. Among the different metrics peculiar to traffic monitoring, one of the most significant is available bandwidth. As well known, a single link is characterized by its capacity, C, defined as the maximum rate at which it can transfer data. Available bandwidth is related to the unused capacity of a link. More precisely, since at a given instant of time t a link is either transmitting at a rate equal to its capacity C or idle, the definition of instantaneous available bandwidth is meaningless, and a certain time-averaging is needed. The available bandwidth of a network path, made of N links, L 1,...,L N, is, in fact, defined as Aðt; DtÞ ¼ min i¼1;...;n 1 Dt Z tþdt t C i ð1 u i ðþ s Þds; ð1þ where C 1,...,C N, are the link capacities and u 1 (t),...,u N (t) are the percentages of link utilization. Estimating the available bandwidth of a network path represents an important task for many applications whose performance and effectiveness can be increased by properly exploiting the output of such activity. For example, available bandwidth evaluation plays a fundamental role in traffic engineering algorithms. For such algorithms, the available bandwidth is one of the major parameters which determine the choice of the best connection path [1]. Different techniques and related software tools, aimed at measuring available bandwidth, have been presented in the literature [2 6]. This paper takes into consideration three of them: (i) Pathload [2,3], which sends packet streams along the path, and tunes the stream rate after analyzing the trend of one-way delays (OWDs), until both an upper and a lower bound for the available bandwidth are found; (ii) IGI [4], which sends packet trains, characterized by increasing gaps between two adjacent packets and then evaluates the available bandwidth on the basis of the variation of the gaps at destination; (iii) pathchirp [6], which launches a number of exponentially spaced probing packet trains, and then performs a statistical analysis at receiver side to determine the available bandwidth. The authors of the above-mentioned tools, when presenting their work, have provided some experimental results with the aim of evaluating tool performance and demonstrating their effectiveness. Furthermore, several comparative studies of tool performance have recently appeared in the literature. In particular, Strauss et al. [7] have extensively tested Pathload and IGI over 400 different paths, but performance comparison lacks a reliable reference. More precisely, the nominal value of the available bandwidth is derived from Multi-Router Traffic Grapher (MRTG) [8], which is presented as the most accurate method to verify the output of available bandwidth estimation tools. MRTG, however, intrinsically suffers from low resolution. A comparative evaluation of system capability effects on tool performance has been presented in [9], and available bandwidth estimation techniques have been classified in [10], where some misconceptions and misinterpretations have been highlighted. Rigorous characterization of all the above-mentioned techniques has not been executed yet. To meet such requirement, the performance of these techniques is here evaluated in terms of measurement repeatability, time and bias with respect to a proper reference value, which is determined through the use of an electronic counter. Performance comparison is then accomplished by putting side-by-side achieved results and evaluating their concurrence, as well. The measurement tools are tested under different cross-traffic conditions, thus extending partial results illustrated in [11], in which only CBR (Constant Bit Rate) background traffic is considered.

3 334 L. Angrisani et al. / Computer Networks 50 (2006) The paper is organized as follows: in Section 2 an overview of the tools under study is presented. Section 3 describes the methodology as well as the testbed used to compare the performance of the considered tools. In Section 4 the tools are tested under different network conditions in terms of both link capacity and competing traffic properties. Finally, Section 5 provides some concluding remarks, together with directions of future work. 2. Techniques for available bandwidth measurement: a brief overview As stated before, three techniques for available bandwidth measurement have been taken into account: Pathload v [2,3], IGI v.1.0 [4], and pathchirp v [6]. Pathload consists of two components: the process called SND, which runs at the sender, and the process called RCV, which runs at the receiver. The process SND transmits a periodic UDP (User Datagram Protocol) packet stream to RCV. Let us suppose that the transmission rate of the stream is R bits per second. Since SND timestamps each packet prior to its transmission with a timestamp t i, RCV can compute the OWD of each packet. Upon the reception of the entire stream, RCV inspects the sequence of OWDs in order to check if the transmission rate R is larger than the available bandwidth A. Indeed, when R > A, the OWDs of the stream packets are expected to have an increasing trend. On the contrary, when R < A, the OWDs have a non-increasing trend. To actually estimate the available bandwidth along the path, SND and RCV have to cooperate so that R converges iteratively to A. Such measurement methodology is called Self-Loading Periodic Streams (SloPS). IGI is based on the following technique. A train of probing packets is sent in quick succession and, at the destination, the variation of the packet pair gaps is calculated. Since probing packets travel through the network, cross-traffic packets may be inserted between them, thus increasing the gaps. As a result, the gap value at the destination would be a function of the cross-traffic rate, which can therefore be estimated. To assure that the probing train actually interleaves with cross-traffic, a sequence of packet trains with increasing gaps is sent from source to destination and the difference between the average source and destination gaps is monitored. When such difference becomes practically zero, i.e. cross-traffic is interleaving with probing packets without causing an increase of the gaps, the so-called turning point is reached and the sending process is stopped. IGI finally computes the available bandwidth by subtracting the estimated amount of cross traffic from the bottleneck link capacity. Based on the concept of self-induced congestion, pathchirp estimates the available bandwidth along a network path by launching a number of packet chirps, i.e. exponentially spaced probing packet trains, from sender to receiver, and then performing a statistical analysis at the receiver side. More precisely, by measuring packet interarrival times, pathchirp makes an estimate of the perpacket available bandwidth as the instantaneous chirp rate at the packet for which the queuing delay begins increasing. It then takes a weighted average of the per-packet estimates in order to evaluate the per-chirp available bandwidth. By further averaging the per-chirp estimates, pathchirp computes the available bandwidth along the network path. 3. Methodology and experimental setup 3.1. Performance comparison methodology In order to carry out the experiments, two couples of hosts have been utilized and a suitable network has been set up. For each configuration about one hundred measurements have been performed, so that a statistically significant sample is available; measurement results have then been processed to evaluate their mean value (l) and experimental standard deviation (r). Measurement results have been compared in terms of measurement (i) concurrence, (ii) repeatability, (iii) bias and (iv) time. With regard to concurrence analysis, measurement results have to be expressed in terms of an interval and related statistical distribution. While IGI and pathchirp provide a single value as the result of a measurement, Pathload gives the

4 L. Angrisani et al. / Computer Networks 50 (2006) available bandwidth variation range. In this light, concerning IGI and pathchirp, the hypothesis of a Gaussian distribution of measurement results is assumed, and the interval considered for concurrence analysis is centred at the mean value and it is six times r wide. As for Pathload, on the contrary, since no confidence level is associated to PathloadÕs range, lower and upper extremes of output intervals are averaged, and the measurement result is assumed to be uniformly distributed within the averaged interval. It is worth stressing that measurement results concur if the related intervals overlap. Repeatability is strictly related to experimental standard deviation. The smaller the experimental standard deviation, the higher the degree of repeatability. Measurement bias is an indicator commonly used to characterize a measurement system, in general. It gives information about non-zero difference between measured and expected value. In the paper, it has been defined as the difference, D, between measurement result and reference value. When investigating measurement bias, the choice of a reference value is crucial; this is particularly true when performance comparison of different measurement solutions is drawn. A proper measurement station, described in the next section, has been set up with the aim of providing a suitable common reference. The time needed by a measurement tool to perform a single measurement and provide the related result is also taken into account as an indicator of the tool performance. Besides being efficient with regard to time saving issues, tools exhibiting reduced measurement time also allow a better tracking in time of the dynamic behaviour of the measured parameters. Comparison among measurement times of different tools is therefore particularly significant, also in consideration of the fact that available bandwidth is defined as a time-averaged metric Measurement testbed Fig. 1 shows the testbed set up by the authors. It comprises a sender host and a receiver host, belonging to different LANs and connected Fig. 1. The measurement station. through a network of generic topology, on which one or more cross-traffic sources are active. The core of the testbed is a digital counter [12]. Its two channels are connected to, respectively, the sender and the receiver. In particular, channel 1 is connected to pin 7 (RTS, Request to Send) of the serial port of the sender, and channel 2 is connected to pin 4 (DTR, Data Terminal Ready) of the serial port of the receiver. The idea is to use a traffic generator to transfer data from sender to receiver and then employ the digital counter, rather than uncalibrated host clocks, to perform accurate time interval measurements, from which the reference value of available bandwidth is derived. A suitable traffic generator, named MGEN [13], is adopted to generate UDP cross-traffic. MGEN allows tuning some traffic parameters, such as statistical traffic characterization (i.e. periodic, Poisson), packet size and traffic rate. Another traffic generator, D-ITG [14], is used to generate TCP and HTTP-like traffic. The Distributed Internet Traffic Generator (D-ITG) is a tool capable of producing network traffic and accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) independent identically distributed (i.i.d.) random variables. The currently

5 336 L. Angrisani et al. / Computer Networks 50 (2006) upported protocols are: TCP, UDP, ICMP, DNS, Telnet, VoIP (G.711, G.723, G.729, Voice Activity Detection, Compressed RTP). The reference value is obtained by calculating the ratio of the amount of transferred data, which is derived from the generator log report, to the transmission time, measured through the electronic counter. Transmission time is measured as the time interval between the rising edges of two voltage pulses, which occur, respectively, on channel 1 and channel 2 of the counter. When the sender starts the transmission, a voltage pulse is generated on its serial port. Then, when the receiver gets the message that the socket has been closed at sender side, a voltage pulse is generated on the serial port of the receiver. The two rising edges of the voltage pulses represent, respectively, the start and the stop event for time interval measurement. In order to generate the two voltage pulses at the right instants, appropriate changes have been made in the source code of the traffic generator. For each network configuration and cross-traffic amount, the mean value over one hundred measurements is chosen as the reference value. This measure represents the common reference needed for bias evaluation Network under test Fig. 2 shows the adopted network. Measurement tools under test run on the first couple of hosts (named Leox and Eufrate), which are equipped with Red Hat Linux (kernel version Fig. 2. The network under test ) and have the same hardware configuration. The other two hosts are used as source and destination for the cross-traffic. All the measurements have been carried out twice, inverting the roles of sender and receiver, in order to detect possible differences between the utilized hosts. For each couple of hosts, both the sender and the receiver are connected to a Cisco 3500 Series switch. The two senders belong to the same LAN, and so are the two receivers; therefore, the two senders actually compete to get the required bandwidth. Depending on the network under test, each switch is connected to a Cisco 2600 Series router equipped with two Fast-Ethernet interfaces or a Cisco 3600 Series router equipped with a Fast-Ethernet interface and a 2 Mbps Serial interface. The choice of such a simple network, comprising only two routers, is motivated by the need to totally control the network under test, in order to apply the proposed method for the reference value determination. In other words, sender and receiver have to be physically close enough, in order to be both connected to the digital counter. 4. Performance comparison Different network conditions in terms of link capacity and cross-traffic characteristics have been considered. As for the background traffic, the following scenarios have been taken into account: (i) constant bit rate UDP streams, (ii) on/off bursty UDP streams, (iii) multiple TCP connections, (iv) superposition of on/off bursty UDP streams and a TCP connection, and (v) UDP streams with several combinations of Pareto interarrivals and constant or Pareto packet sizes. The considered cross-traffic scenarios represent one of the largest experimental sets presented in the literature. For each scenario and for each considered tool, about one hundred measurements distanced of about 10 s from one another have been made with the aim of granting their independence from one another. This section is organized as follows. In the first subsection a performance comparison of the employed tools on a network with 10 Mbps capacity

6 L. Angrisani et al. / Computer Networks 50 (2006) is carried out, with respect to all the considered cross-traffic scenarios. In the second subsection differences observed on a slower (2 Mbps) and a faster (100 Mbps) link are illustrated, and possible dependency of the results on network capacity is investigated Network with 10 Mbps bandwidth It is worth stressing out that each tool has some parameters peculiar to the measurement technique it implements. With respect to tool performance, the most significant parameters are number and size of probing packets for IGI, number and length of streams for Pathload, and measurement time and probing packet size for pathchirp. Authors of the related works have proposed some default values for these parameters, but the experimental evidence suggests that their values might be differently tuned, depending on the cross-traffic nature, in order to achieve better performance. Therefore, for each considered cross-traffic scenario, a prior optimization of the parameters has been experimentally executed and the results obtained with the optimal combination of parameters have then been reported for performance comparison UDP cross-traffic with constant bit rate The first set of experiments has been carried out by using cross-traffic with constant bit rate (CBR). In particular, the percentage of link utilization, u, has been set equal to (i) 20%, (ii) 50% and (iii) 80%. MGEN has been used as cross-traffic generator for this set of experiments. In these first experiments, default parameter values have proved to be suitable and have therefore been adopted for the comparison. In particular, with regard to IGI, 60 packets of 500 bytes have been used; concerning Pathload, the fleet consists of 12 streams of 100 packets each; as for pathchirp, finally, probing packets of 1000 bytes have been used, the spread factor has been chosen equal to 1.2, and the measurement time has been set equal to 40 s (this is the only parameter that has been modified with respect to its default value of 600 s, which has proved to be too high for the scenario under test). Table 1, which reports related measurement results, is divided into three sections, each corresponding to a different percentage of link utilization. For each section, together with the nominal value, which is only theoretical, a reference value of available bandwidth, achieved through the application of the method proposed in section 3.2, is reported. Results are expressed in terms of Table 1 Measurement results in the presence of CBR cross-traffic, for different values of u, percentage of usage of the link EUFRATE! LEOX LEOX! EUFRATE IGI pathchirp Pathload IGI pathchirp Pathload Competing traffic = 20% capacity Reference value = Mbps Reference value = Mbps l [Mbps] r% D% Competing traffic = 50% capacity Reference value = Mbps Reference value = Mbps l [Mbps] r% D% Competing traffic = 80% capacity Reference value = Mbps Reference value = Mbps l [Mbps] r% D%

7 338 L. Angrisani et al. / Computer Networks 50 (2006) mean value, l, experimental standard deviation, r, and difference D between the mean value and the reference value. Both experimental standard deviation and difference between mean and reference value are expressed in percentage relative terms. With regard to Pathload, difference D from the reference value is referred to the centre of the interval, l, and experimental standard deviation is equal p to the amplitude of the interval, scaled by 2 ffiffi 3. Fig. 3 aligns and compares the measurement intervals of the different techniques for concurrence analysis purpose. The figure refers to the connection from Leox to Eufrate; the opposite path has, in fact, offered similar outcomes. In particular, horizontal bars represent the intervals that indicate measurement results; three groups of three bars can be singled out, according to the different cross-traffic conditions. In particular, starting from the top of the figure, u is equal, respectively, to 80% for the first, 50% for the second, and 20% for the last set of three bars. From Table 1 and Fig. 3, the following considerations can be drawn: Measurement results provided by IGI are less biased for high cross-traffic rates than for low ones and are characterized by an appreciable degree of repeatability (the relative experimental standard deviation is much inferior to 10%). The value of r, which is inferior to 1% for the lowest values of u, is noticeable. pathchirp gives similar results as IGI in terms of D%, while r% is slightly higher. The way Pathload expresses measurement results (an interval) does not allow a clear comparison with other considered techniques based on repeated measurements. Measurement results are, in fact, expressed in terms of an interval which is definitely too wide, as revealed by a large relative standard deviation (up to 20% of the mean value). Even though the reference value falls within that interval, it is difficult to assess whether the tool gives the expected results or not. For the same reason, some cells in the table are intentionally left blank: the choice of calculating D as the difference between the reference value and the centre of the interval can lead to high values for D% even when the reference value falls within that interval. Intervals related to different techniques overlap, and measurements results therefore concur On/off bursty UDP cross-traffic A bursty cross-traffic, i.e. a traffic characterized by a variable bit rate (VBR), has been considered in a large set of experiments. Cross-traffic in real networks is, in fact, typically bursty, rather than CBR, and depending on its burstiness, the available bandwidth can vary dynamically during a measurement period. A characterization of available bandwidth measurement tools should Fig. 3. Concurrence analysis of measurement results in the presence of CBR traffic for different values of link utilization percentage u.

8 L. Angrisani et al. / Computer Networks 50 (2006) therefore include performance assessment in the presence of bursty cross-traffic. In particular, UDP streams of on/off bursty traffic have been introduced in our experiments. A source produces on/off bursty traffic when it can operate in only two conditions: in the on state, it transmits data at a peak and constant rate, and in the off state it does not transmit. In our experiments, the overall source activity, i.e. the alternation of on and off intervals is periodic, and the percentage of time the source is in the on state is referred to as burst duty factor, df. The source burstiness, defined as the ratio of the peak to the average transmission rate, can be considered as an indicator of the source activity: the higher the burstiness, the more different the source behaviour from that of a CBR source (CBR sources are characterized by a unitary burstiness). Following this definition, it is easy to realize that source burstiness is the reciprocal of df. Experiments with UDP streams characterized by different burst duty factors (25%, 50% and 75%), different values of peak transmission rate, p (20%, 40%, and 80% of the link capacity), and a period equal to 2 s, have been carried out. In this set of experiments, MGEN has been used as traffic generator. For the sake of brevity, numerical results related to only some representative cross-traffic scenarios are given. From such results, the dependence of tool performance on parameters values can be inferred. Before comparing the tool outputs, details regarding the tuning of the tool parameters, with regard to their default values, are given. IGI: Concerning IGI, experiments have been made with 60 (default value), 120 and 240 probing packets; packet sizes of 500 (default value), 750, 1000, 1250 and 1400 bytes have been chosen. Larger packet sizes, bigger than the MTU (Maximum Transmission Unit), would imply the fragmentation of the packet into two smaller packets and, consequently, have been ignored. For the sake of clarity, Table 2 shows measurement results achieved in the presence of cross-traffic characterized by df = 0.25 and p = 8 Mbps. Results related to all the combinations of the tool parameter values taken into account are reported in the table and are expressed in terms of l, r% and D%. Experimental results highlight that an increase in the number of probing packets does not generally provide better results in terms of D%, difference between measured and reference values. In the few cases where a slight reduction of D% (a few tenths percentage points) is experienced, significant increases in both measurement time and tool intrusiveness counterbalance it. On the contrary, increasing packet size has turned out to be a good way of enhancing the tool performance. More precisely, the choice of smaller probing packets has resulted in an underestimate of available bandwidth equal to about 6 12% of the reference value, while for packet sizes of Table 2 Measurement results provided by IGI, in the presence of on/off bursty UDP cross-traffic characterized by df = 0.25 and p = 8 Mbps, for different values of the tool parameters, number of packets N and packet size Packet size 500 bytes 750 bytes 1000 bytes 1250 bytes 1400 bytes l [Mbps] N = 60 packets r% D% l [Mbps] N = 120 packets r% D% l [Mbps] N = 240 packets r% D% The reference value, measured through the counter, is 8.62 Mbps.

9 340 L. Angrisani et al. / Computer Networks 50 (2006) , 1250 and 1400 a slight overestimate, always within 2% of the reference value, has been experienced. The optimal choice turns out to be 60 packets of 1250 bytes. Two reasons may be adduced to explain such erroneous estimate in case of small packet sizes, as already highlighted in [4], and both of them depend on the fact that the gap value at the turning point proportionally grows with the packet size. Such behaviour is shown in Fig. 4, which plots Fig. 4. Values of initial gap and difference between initial and output gap for single measurement using IGI, with probing packets consisting of (a) 500, (b) 750, (c) 1000, and (d) 1250 bytes. the difference between initial and output gap as a function of the initial gap, for probing packets consisting, respectively, of (a) 500, (b) 750, (c) 1000, and (d) 1250 bytes. In detail, the fact that smaller packets result in smaller gaps has two effects: (i) the resulting probing train is more sensitive to the burstiness of the cross-traffic, and therefore the convergence of the gap difference to zero is oscillating and less regular than the one experienced with larger probing packets; as a consequence, higher values of experimental standard deviation and reduced measurement repeatability are experienced. Moreover, (ii) it is harder to correctly generate and measure smaller gap values. As a further example, Table 3 shows measurement results achieved in the presence of cross-traffic characterized by df = 0.5 and p = 4 Mbps. The average cross traffic rate is 2 Mbps, the same as in the previous example, while the burstiness is halved. The results confirm that D is influenced by packet size, rather than number of packets. The best choice of parameters, i.e. the one that grants the minimum D%, is 120 packets of 1400 bytes. pathchirp: The first noticeable issue regarding parameter values for pathchirp is that default measurement time is set equal to 600 s, while our experience for the network under test has shown that much shorter times (20 40 s) are enough to assure good measures. As for packet size, which is the other parameter taken into account, we used packets of at least 1000 bytes, following the authorsõ suggestion [6], and not larger than the MTU, in order to avoid fragmentation. Table 4 depicts the results in the presence of a cross-traffic characterized by values of df and p equal to 0.25 and 8 Mbps, respectively. The results show that the tool overestimates the available bandwidth for longer measurement times and provides more accurate measurement results for larger packets. The optimal measurement time, i.e. the one granting the lowest D% (inferior to 2% for packets of 1200 and 1400 bytes), has come out to be equal to 20 s. Pathload: Let us consider again the scenario where the cross-traffic is characterized by df =

10 L. Angrisani et al. / Computer Networks 50 (2006) Table 3 Measurement results provided by IGI, in the presence of on/off bursty UDP cross-traffic characterized by df = 0.5 and p = 4 Mbps, for different values of the tool parameters, number of packets N and packet size Packet size 500 bytes 750 bytes 1000 bytes 1250 bytes 1400 bytes l [Mbps] N = 60 packets r% D% l [Mbps] N = 120 packets r% D% l [Mbps] N = 240 packets r% D% The reference value, measured through the counter, is 8.53 Mbps. Table 4 Measurement results provided by pathchirp, in the presence of on/off bursty UDP cross-traffic characterized by df = 0.25 and p = 8 Mbps, for different values of the tool parameters, packet size and measurement time Pkt size = 1000 bytes Pkt size = 1200 bytes Pkt size = 1400 bytes Pkt size = 1000 bytes Pkt size = 1000 bytes Meas. time = 20 s Meas. time = 20 s Meas. time = 20 s Meas. time = 40 s Meas. Time = 60 s l [Mbps] r% D% The reference value, measured through the counter, is 8.62 Mbps and p = 8 Mbps. With the default values of N = 12 streams and L = 100 packets, Pathload significantly underestimates available bandwidth (the actual available bandwidth is about four times the measured one). The tool therefore seems to be totally inaccurate in the presence of a bursty traffic characterized by a low df. As the experiments have proved, however, such inaccuracy is only due to the inadequateness of the default values, and accurate measurements can be achieved by properly fixing them. As shown in Table 5, which gives the results of sets of measurements carried out with different values of N and keeping L equal to 100 packets, reducing the number of streams does not provide significant improvements, the estimated value being still very distant from the actual one. On the contrary, a reduction of the number of probing packets in each stream is the correct way of tuning the parameters and granting good performance. Specifically, Table 5 also reports the results achieved by successively modifying the value of L, while keeping N equal to its default Table 5 Measurement results provided by Pathload, in the presence of on/off bursty UDP cross-traffic characterized by df = 0.25 and p = 8 Mbps, for different values of the tool parameters, number of streams, N, and stream length, L N =12 N =8 N =6 N =4 N =2 N =1 N =12 N =12 L = 100 L = 100 L = 100 L = 100 L = 100 L = 100 L =50 L =40 l [Mbps] r% The reference value, measured through the counter, is 8.62 Mbps.

11 342 L. Angrisani et al. / Computer Networks 50 (2006) value of 12 streams; the optimal value for L is 50 packets. The reason for this behaviour of the tool essentially lies in its iterative operation: with default parameter values almost every stream is labelled as being characterized by an increasing OWD trend, i.e. each stream is affected by crosstraffic, even though the latter is present only for 25% of measurement time and, consequently, the estimate converges to a value that is definitely lower than the expected one. By reducing the stream length, there are more streams not affected by cross-traffic and not labelled as being characterized by an increasing OWD trend; therefore, the bursty nature of cross-traffic is better tracked down by the tool. On the other hand, performance tends to worsen when streams consisting of less than 50 packets are used; we conjecture that this worsening is probably due to the limited number of samples considered to evaluate the OWD trend. In conclusion, 50 packets seem to be the optimal choice in the presence of bursty traffic. Only after tuning the parameters of all the tools, an intelligible and significant performance comparison can be gained. To this aim, Table 6 shows measurement results provided by the tools, in different scenarios of bursty cross traffic; in particular, different duty factors have been considered, for a given p = 8 Mbps. From the analysis of the results, the following considerations can be drawn: Experimental standard deviation, r, is generally lower for lower values of df. At the same time, in the presence of a low bursty duty factor (df = 0.25), difference between measured and reference value, D, is significantly lower than for higher values of df. The tools exhibit good performance, in terms of measurement bias, especially for df = 0.25 (D = 1.0% for IGI and D = 0.8% for pathchirp). Measurement bias results provided by Pathload are definitely worse than those provided by IGI and pathchirp. Indeed, except for df = 0.25, D% is bigger than 13% and r% equal to 48%, whereas df = 0.75 accounts for meaningless results. The best results in terms of measurement bias are granted by pathchirp, while IGI results exhibit a slightly lower experimental standard deviation. Such considerations are generally valid, regardless of the value of df. Measurement results provided by the three tools generally concur. Some further considerations on measurement time can be drawn: Table 6 Measurement results provided by all the considered tools, in the presence of on/off bursty UDP cross traffic characterized by p = 8 Mbps and different values of df IGI pathchirp Pathload df = 0.25 Reference value = 8.62 Mbps l [Mbps] r% D% df = 0.5 Reference value = 6.75 Mbps l [Mbps] r% D% df = 0.75 Reference value = 4.43 Mbps l [Mbps] r% D%

12 L. Angrisani et al. / Computer Networks 50 (2006) Measurement time is an input parameter for pathchirp. In the large number of experiments carried out, 20 s are enough to achieve a good bandwidth estimate. A measurement time greater than 20 s does not generally provide better results in terms of both lower D and r. IGI converges more slowly when more packets and/or larger packets are utilized. With regard to experiments carried out with df = 0.25, for instance, when 60 packets of 500 bytes are used, measurement time is about 20 s; if 60 packets of 1000 bytes are used, measurement time is about 30 s; measurement time grows up to respectively about 40 s and 60 s when packet size is raised to 1400 bytes and the number of packets is increased to 240. Similarly, the higher the cross-traffic rate, the higher the measurement time. With regard to Pathload, when default parameter values are adopted, measurement time is generally longer than 60 s, and becomes longer than 80 s for higher cross-traffic rates. Even if the stream length is halved, measurement time is not shorter than 50 s. In conclusion, pathchirp proves to be definitely more effective in terms of reduced measurement time, whereas Pathload is characterized by the highest measurement time Multiple TCP connections Most of Internet applications adopt TCP as transport protocol. Scenarios where cross-traffic consists of TCP connections, as well as a superposition of bursty UDP streams and TCP connections, are therefore realistic, and it is worth including them in our set of experiments. In particular, experiments involving the combination of multiple periodic TCP streams have shown that tool performance does not vary significantly as a function of the number of streams and their average rate. Consequently, for the sake of brevity, Table 7 shows measurement results provided by all the considered tools under the respective optimal parameter choices, when cross-traffic consists of two 2 Mbps TCP periodic streams. The table also reports the optimal parameter combinations. The three tools provide concurrent results (the related intervals are not disjoint) and experimental standard deviation is within few percents. As in the on/off bursty UDP cross-traffic scenario, pathchirp grants a reduced measurement bias, whereas IGI accounts for a lower experimental standard deviation Superposition of on/off bursty UDP streams and a TCP connection Further experiments have been carried out considering combinations of bursty UDP traffic and TCP connections. Indeed, a mixed UDP TCP traffic is a quite common situation in the Internet scenario. Table 8 accounts for the measurement results provided by the tools in the presence of crosstraffic consisting of a combination of a bursty 8 Mbps UDP stream, with df = 0.25, and one or two 1 Mbps TCP streams, respectively. IGI and pathchirp give better results in terms of measurement bias (D between 1% and 4%), whereas the experimental standard deviation characterizing Pathload results is lower than the others (4 6% against 6 8%). On the overall, the three tools provide good results both in terms of D% and r%. Table 7 Measurement results provided by all the considered tools, under the respective optimal parameter choices, in the presence of crosstraffic consisting of two 2 Mbps TCP periodic streams IGI pathchirp Pathload 60 packets Meas. time = 20 s 40 streams Packet size = 1000 bytes Packet size = 1200 bytes Stream length = 150 packets Reference value = 6.04 Mbps l [Mbps] r% D%

13 344 L. Angrisani et al. / Computer Networks 50 (2006) Table 8 Measurement results provided by the tools in the presence of cross-traffic consisting of a combination of a bursty 8 Mbps UDP stream, with df = 0.25 and, respectively, one or two 1 Mbps TCP streams IGI pathchirp Pathload 60 packets Meas. time = 20 s 12 streams Packet size = 1250 bytes Packet size = 1200 bytes Stream length = 50 packets Reference value = 7.58 Mbps l [Mbps] r% D% Reference value = 6.43 Mbps l [Mbps] r% D% UDP streams with combinations of Pareto packet interarrivals, and constant or Pareto packet sizes Due to the Internet traffic complexity and variability, it is difficult to gain a unique model for simulating and analyzing its behaviour [15]. The evolution of networks and applications has required and still requires a continuous tuning of traffic models [16 21]. A number of studies, based on the analysis of aggregated traffic, have proved that traffic on the Internet has a self-similar or fractal nature [16,22]. Research activities have been also conducted on the effects of traffic characteristics on network performance [23, 24]. Some of the results of those studies have inspired the experiments that are described in the following. In the first set of experiments, in particular, self-similar traffic has been considered [19], packet interarrivals being modelled as i.i.d. random variables of a Pareto distribution, with a mean value of 3 ms and shape factor a = 1.5. Generated packets consist of 1470 bytes. For the sake of brevity, the outcomes of three configurations are shown, in which cross-traffic consists respectively of one and three UDP streams with the aforementioned statistical characteristics. Related results are reported in Table 9; both D% and r% are slightly higher than in the other experiments, but they still represent acceptable values, D% remaining within some percents. Some experiments where the cross-traffic is made up of packets characterized by both interarrivals and sizes with a Pareto distribution have also been carried out, according to the results presented in [16]. In particular, packet interarrivals have the same statistical characterization of the previous experiments, while packet sizes are i.i.d. Pareto random variables, with a mean equal to 2000 bytes and a shape factor a = As shown in Table 10, in such cases IGI provides worse results than the other two tools (D = 17% and r = 12%). The reason might be found in the high variability that has been imposed on cross-traffic, which could prevent IGI from correctly reaching the turning point. When adopting Pareto distribution, strong statistic dependence between packet interarrivals is imposed. A recent paper [25] has, indeed, put in evidence that the long-range dependence (LRD) of packet interarrivals is an invariant characteristic for time scales longer than 1 s, whereas for time scales up to 100 ms, the statistical correlation is much weaker. Since the algorithms for available bandwidth estimation, on which the three considered tools are based, mainly generate packets at time intervals inferior to 100 ms, further experiments have been carried out by adopting a different traffic model. More precisely, cross-traffic consists of packets whose sizes are distributed as Pareto i.i.d. random variables (mean L = 4100 bytes, a = 1.35) and whose interarrival times are distributed as exponential i.i.d. random variables. Different values of parameter k, which is the reciprocal of the mean interarrival time, have been taken into account for the experiments (k = 64,

14 L. Angrisani et al. / Computer Networks 50 (2006) Table 9 Measurement results provided by the tools in the presence of UDP cross-traffic characterized by interarrival times modeled as i.i.d. random variables of a Pareto distribution, with a mean value of 3 ms and shape factor a = 1.5 IGI pathchirp Pathload 60 packets Meas. time = 30 s 12 streams Packet size = 1250 bytes Packet size = 1200 bytes Stream length = 50 packets 1 UDP stream Reference value = 7.01 Mbps l [Mbps] r% D% packets Meas. time = 20 s 12 streams Packet size = 1250 bytes Packet size = 1200 bytes Stream length = 50 packets 3 UDP streams Reference value = 6.18 Mbps l [Mbps] r% D% Generated packets consist of 1470 bytes. Table 10 Measurement results provided by the tools in the presence of UDP cross-traffic characterized by interarrival times modeled as i.i.d. random variables of a Pareto distribution, with a mean value of 3 ms and shape factor a = 1.5, and packet sizes modeled as i.i.d. Pareto random variables, with a mean equal to 2000 bytes and a shape a = 1.21 IGI pathchirp Pathload 60 packets Meas. time = 30 s 12 streams Packet size = 1250 bytes Packet size = 1200 bytes Stream length = 50 packets Reference value = 1.79 Mbps l [Mbps] r% D% , 256 packets/s); expected percentage of link utilization u has been evaluated according to u Æ C = k Æ L (u = 20%, 50%, 80%). All the related results are given in Table 11. While IGI suffers from values of both D% and r% even higher than 10% and up to 19%, values of D% andr% experienced with pathchirp are always inferior to 10% (less than 3% when u = 20%) Further scenarios As already stated, experiments carried out on 10 Mbps capacity link have been repeated on a slower link, without changing network topology. In particular, the two routers have been connected through a 2 Mbps link. The first noticeable issue on such slower link concerns Pathload, which either does not provide results, or provides too wide intervals. Performance comparison in this case has therefore been limited to IGI and pathchirp. In a constant bit rate traffic scenario, IGI exhibits higher values of D% on the 2 Mbps link than on the 10 Mbps one. Its performance is worse for higher values of u, reaching peaks of more than 15% when u is equal to 80%. Irrespectively of u, pathchirp generally overestimates available bandwidth, and its results are characterized by higher experimental standard deviation, r being generally greater than 10%.

15 346 L. Angrisani et al. / Computer Networks 50 (2006) Table 11 Measurement results provided by the tools in the presence of cross-traffic characterized by interarrival times distributed as exponential i.i.d. random variables, and packet sizes modeled as i.i.d. Pareto random variables, with a mean equal to 4100 bytes and a shape a = 1.35 IGI pathchirp Pathload u = 20% Reference value = Mbps l [Mbps] r% D% u = 50% Reference value = Mbps l [Mbps] r% D% u = 80% Reference value = Mbps l [Mbps] r% D% When bursty UDP traffic is considered, IGI does not seem to benefit from a probing packet size increase, contrary to expectations and experimental evidence on the 10 Mbps link; values of D% are generally worse with respect to the previous network configuration. Concerning pathchirp, experimental standard deviation is definitely too high (r > 20%), and available bandwidth is overestimated. If measurement time is increased, however, lower values of D% and r% are experienced, both being within 7%. In the presence of cross-traffic consisting of a superposition of TCP streams, a good repeatability is experienced with both tools, along with little difference between measured and reference available bandwidth values. Similar outcomes are observed when a UDP stream is also present, except for values of D% related to pathchirp, which overestimates available bandwidth even more than 10% over reference value. Finally, contrary to the 10 Mbps scenario, IGI provides satisfying results in the presence of cross-traffic consisting of UDP streams with combinations of Pareto packet interarrivals, and constant or Pareto packet sizes, whereas pathchirp does not confirm the performance shown on the 10 Mbps link, irrespective of measurement time value. The last set of experiments has been performed on a network with 100 Mbps capacity. It has to be noted that the three tools give better results in the CBR background traffic scenario. More precisely, IGI shows optimal performance in case of u = 20% and u = 50%, D% being smaller than 4%. This behaviour contrasts with performance observed in the 10 Mbps scenario, where IGI provides less biased results for higher cross-traffic rates. When u = 80%, the best results are provided by Pathload, which, anyway, exhibits a satisfying behaviour even when the link utilization is lower. With regard to pathchirp, its performance improves as the percentage of competing traffic grows. Experimental standard deviations related to the three tools are comparable to those experienced in the 10 Mbps scenario. In the presence of UDP bursty traffic, IGI performance does not particularly benefit from an increase in either the number of probing packets, or their size. All experienced values of both D% and r% are, in fact, higher than 7%. As already experienced in the 10 Mbps scenario, the best estimates attained by using pathchirp refer to a measurement time equal to 20 s, which is much lower than default value. Experimental standard deviation, however, is higher than 10%. Results provided by the three tools with bursty UDP cross-traffic concur.

16 L. Angrisani et al. / Computer Networks 50 (2006) With respect to the 10 Mbps scenario, results with TCP cross-traffic are less satisfying. Specifically, both D% and r% are notably higher, for all the considered tools. The most representative example regards pathchirp, which suffers from bandwidth underestimation, and exhibits values of D% generally greater than 10 15%. Finally, in the presence of UDP traffic with Pareto packet interarrivals, IGI turns out to be the most performing tool, even if it overestimates the actual available bandwidth, while pathchirp does not confirm the good performance shown in the 10 Mbps scenario, thus replicating the behaviour observed in the 2 Mbps network. In particular, pathchirp results are characterized by a r% greater than 20%. 5. Conclusions The concept of bandwidth is central to packetswitched networks since it refers to the amount of data a link or a network path can transfer per unit of time. Several applications can benefit from knowing the bandwidth characteristics of network paths traversed by their traffic. In fact, bandwidth estimation allows applications such as file transfers or multimedia streaming to optimize their performance. The bandwidth available to an application directly impacts its performance. Several techniques have been defined to measure the available bandwidth of a link or a path, but a rigorous characterization and performance comparison is missing. This paper has aimed at comparing the performance of three different tools that employ diverse strategies to estimate the available bandwidth. The considered tools are: Pathload, which measures the available bandwidth by sending packet streams and analyzing the trend of one-way delays at the receiver side; IGI, which evaluates the available bandwidth on the basis of the variation of the gaps between two adjacent packets at destination; pathchirp, which estimates the available bandwidth by sending exponentially spaced probing packet trains and measuring packet interarrivals. Comparison of results has not been limited to mean values, but it has also been based on concurrence, repeatability and bias of the measurements. With the aim of evaluating the latter, a reference value has been obtained by means of a suitable measurement station set up by the authors. Moreover, with regard to possible values of several parameters, such as cross-traffic type, cross-traffic rate and direction of the probing traffic, a large set of experimental tests has been carried out. What has clearly come out from the experiments is a good repeatability for all three techniques in the 10 Mbps scenario, as proved by experimental standard deviations of few percentage units. This has been true for both IGI and pathchirp, whereas in some cases r% experienced with Pathload has been higher than 15%, due to the way it outputs measurement results. Experimental standard deviation has become higher as cross-traffic variability has increased. This phenomenon has been more evident on faster (100 Mbps) and slower (2 Mbps) links. At the same time, results have shown that it is impossible to determine which technique and related software implementation are absolutely the best, since the performance has varied depending on cross-traffic characteristics, and all the techniques have presented a certain bias. In case of cross-traffic with constant bit rate, intervals representing measurement results of the three tools have concurred. PathChirp has given similar results as IGI in terms of D% in all the considered scenarios, whereas its r% has been generally higher. Pathload results have generally been characterized by high values of both D% and r%, since the output of the tool is an interval rather than a single value. In the 100 Mbps scenario, however, the best results with high link utilization have been attained by using Pathload. In the scenario characterized by bursty crosstraffic, as well as when cross-traffic has consisted of multiple TCP connections, results provided by the three tools have concurred. More precisely, in case of on/off bursty UDP cross-traffic, pathchirp has shown the most robust behaviour with respect to the variations of crosstraffic parameters in the 10 Mbps scenario, whereas IGI has performed better than the other tools in terms of both D% and r% in both the 100 Mbps and 2 Mbps scenarios. Finally, Pathload has proved to be inadequate to this scenario.

17 348 L. Angrisani et al. / Computer Networks 50 (2006) In the presence of competing traffic consisting of two TCP periodic streams characterized by a bit rate equal to 20% of the link capacity, IGI and pathchirp have shown similar overall performance: a better bandwidth estimate is paid with a larger standard deviation. However, pathchirp has exhibited values of D% generally greater than 10 15% in the 100 Mbps scenario, and it is therefore inadequate. Also with this kind of cross-traffic, Pathload has performed worse than the other two tools. Cross-traffic statistical distributions have also been considered. It has to be noticed that in the 10 Mbps scenario with competing traffic characterized by constant packet size and Pareto packet interarrivals, the three tools have provided values of both D% and r%, which have been slightly higher than those observed in the same scenario with different cross-traffic. In the other capacity scenarios, results have generally been worse when competing traffic interarrivals are Pareto distributed. On the whole, the analysis carried out in this work has shown that the tools under study reach considerable performance in all the capacity scenarios, provided that the cross-traffic presents a low degree of variability. Indeed, the trend has revealed an increase in result degradation as traffic variability grows. Future research activity will aim at executing further experimental tests on more complex network topologies and developing a new and more powerful technique for available bandwidth measurement, capable of overcoming most flaws identified in the analyzed ones. Acknowledgment This work has been partly supported by the European Union under the E-Next Project FP References [1] M. Kodialam, T.V. Lakshman, Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information, IEEE/ACM Transactions on Networking 11 (3) (2003) [2] M. Jain, C. Dovrolis, End-to-end available bandwidth: measurement methodology, dynamics and relation with TCP throughput, in: Proceedings of ACM SIGCOMM, August [3] M. Jain, C. Dovrolis, Pathload: a measurement tool for end-to-end available bandwidth, in: Proceedings of Passive and Active Measurement Workshop, March [4] N. Hu, P. Steenkiste, Evaluation and characterization of available bandwidth probing techniques, IEEE JSAC Special Issue in Internet and WWW Measurement, Mapping, and Modeling 21 (6) (2003) [5] C. Dovrolis, P. Ramanathan, D. Moore, What do packet dispersion techniques measure? Proceedings of IEEE INFOCOM 2 (Apr.) (2001) [6] V. Ribeiro, R. Riedi, R. Baraniuk, J. Navratil, L. Cottrell, pathchirp: efficient available bandwidth estimation for network paths, in: Proceedings of Passive and Active Measurements Workshop, April [7] J. Strauss, D. Katabi, F. Kaashoek, A measurement study of available bandwidth estimation tools, in: Proceedings of Internet Measurement Conference, Miami, Florida, October [8] T. Oetiker, Monitoring your IT gear: the MRTG story, IEEE IT Professional 3 (6) (2001) [9] G. Jin, B.L. Tierney, System capability effects on algorithms for network bandwidth measurement, in: Proceedings of Internet Measurement Conference, Miami, Florida, October [10] M. Jain, C. Dovrolis, Ten fallacies and pitfalls on end-toend available bandwidth estimation, in: Proceedings of Internet Measurement Conference, Taormina, Italy, October [11] L. Angrisani, S. DÕAntonio, M. Vadursi, G. Ventre, Performance comparison of different techniques for available bandwidth measurement in packet-switched networks, in: Proceedings of VECIMSÕ03, Lugano, Switzerland, July 2003, pp [12] Agilent 53131A/132A/181A Counters. High-performance, low-cost counters simplify and speed systems and bench frequency measurements, Product Overview, Agilent Technologies Literature no EN, May [13] NRL Protocol Engineering Advanced Networking Research Group, The Multi-Generator (MGEN) Version 4.0 UserÕs and reference Guide. Available from: < [14] S. Avallone, D. Emma, S. Guadagno, A. Pescapè, G. Ventre, D-ITG: distributed internet traffic generator, in: Proceedings of QEST2004, September 27 30, 2004, Enschede (Netherlands). [15] S. Floyd, V. Paxson, Difficulties in simulating the internet, IEEE/ACM Transactions on Networking 9 (4) (2001) [16] W. Willinger, V. Paxson, M.S. Taqqu, Self-similarity and heavy tails: structural modeling of network traffic, A

18 L. Angrisani et al. / Computer Networks 50 (2006) Practical Guide to Heavy Tails, Chapman & Hall, New York. [17] V.A. Bolotin, Y. Levy, D. Liu, Characterizing data connection and messages by mixtures of distributions on logarithmic scale, in: Proceedings of ITC-16, Edinburgh, UK, June 1999, pp [18] V. Paxson, Empirically-derived analytic models of widearea tcp connections, IEEE/ACM Transactions on Networking 2 (4) (1994) [19] V. Paxson, S. Floyd, Wide area traffic: the failure of Poisson modeling, IEEE/ACM Transactions on Networking 3 (3) (1995) [20] K.V. Cardoso, J.F. de Rezende, Design and Use of an aggregated HTTP model, in: Proceedings of IEEE International Conference on Communications, April [21] J. Cao, W.S. Cleveland, D. Lin, D.X. Sun, On the nonstationarity of internet traffic, in: Proceedings of ACM SIGMETRICS/Performance, Cambridge, MA, June [22] M.E. Crovella, A. Bestavros, Self-similarity in world wide web traffic: evidence and possible causes, IEEE/ACM Transactions on Networking 5 (6) (1997) [23] K. Park, G.T. Kim, M.E. Crovella, On the effect of traffic self-similarity on network performance, in: Proceedings of SPIE International Conference on Performance and Control of network Systems, November [24] M.E. Crovella, Performance evaluation with heavy tailed distributions, Lecture Notes in Computer Science, vol. 1786, March 2000, pp [25] Z.-L. Zhang, V.J. Ribeiro, S.B. Moon, C. Diot, Small time scaling behaviors of Internet backbone traffic: an empirical study, in: Proceedings of INFOCOM2003. Leopoldo Angrisani was born in Nocera Superiore, SA, Italy, on April 16, He received the M.S. degree (cum laude) in electronic engineering from the University of Salerno, Salerno, Italy, in 1993 and the Ph.D. degree in electrical engineering from the University of Napoli Federico II, Napoli, Italy, in Since 2002, he has been an Associate Professor with the Dipartimento di Informatica e Sistemistica, University of Napoli Federico II. He is involved in research on new methods based on the wavelet transform for detecting, measuring, and classifying transient signals, new methods based on chirplet and warblet transforms for instantaneous frequency estimation, new methods based on time frequency transforms for testing RF equipment for mobile communications, new measurement procedures for communication networks test and measurement, and design, realization, and characterization of VXI instruments based on digital signal processors. Salvatore DÕAntonio received the M.S. degree in computer engineering from the University of Naples Federico II. He is currently a researcher at C.I.N.I., the Italian University Consortium for Computer Science. His current research interests include network monitoring and control, Quality of Service (QoS) provisioning over IP networks and e- business platforms. He is currently involved in a number of international research projects in the area of interdomain QoS monitoring and delivery. Marcello Esposito received the degree in Telecommunications Engineering from the University of Napoli Federico II in He is currently working as a researcher at C.I.N.I., the Italian University Consortium for Computer Science and he teaches Computer Programming at the University of Napoli. His research interests include QoS provisioning, interdomain network management and content adaptation for web services. Michele Vadursi was born in Naples, Italy, on May 9, He received the M.S. degree (cum laude) in telecommunication engineering from the University of Naples ÔFederico IIÕ, Naples, Italy, in He is currently pursuing the Ph.D. degree in electrical engineering at the same University. His research activity is focused on QoS evaluation in both wired and wireless LANÕs, RF transmitter testing and troubleshooting, and instantaneous frequency estimation through digital signal processing.

Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation

Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation Manish Jain Georgia Tech jain@cc.gatech.edu Constantinos Dovrolis Georgia Tech dovrolis@cc.gatech.edu ABSTRACT The area of available

More information

Network Performance Evaluation of Latest Windows Operating Systems

Network Performance Evaluation of Latest Windows Operating Systems Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia

More information

II. BANDWIDTH MEASUREMENT MODELS AND TOOLS

II. BANDWIDTH MEASUREMENT MODELS AND TOOLS FEAT: Improving Accuracy in End-to-end Available Bandwidth Measurement Qiang Wang and Liang Cheng Laboratory Of Networking Group (LONGLAB, http://long.cse.lehigh.edu) Department of Computer Science and

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation

More information

Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report

Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report Investing in the future by working together for a sustainable and competitive region Bandwidth Estimation using Passive Monitoring

More information

Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks

Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks Khondaker M. Salehin and Roberto Rojas-Cessa Networking Research Laboratory Department of Electrical and Computer Engineering

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

Comparison of Wireless Protocols. Paweł Ciepliński

Comparison of Wireless Protocols. Paweł Ciepliński Comparison of Wireless Protocols Comparison of Wireless Protocols Field test and comparing 82.11 protocol vs nstreme In Point To Multipoint scenarios IDEA? What force me to make such a comparison. Testing

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Bandwidth Measurement in Wireless Networks

Bandwidth Measurement in Wireless Networks Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited

More information

A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring

A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring Cesar D Guerrero 1 and Miguel A Labrador University of South Florida Department of Computer Science and Engineering Tampa,

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Effects of Interrupt Coalescence on Network Measurements

Effects of Interrupt Coalescence on Network Measurements Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,dovrolis@cc.gatech.edu Abstract. Several

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff

51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff 51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff A standard monitoring algorithm for two traffic types--constant bit rate (e.g., voice) and variable bit rate (e.g., compressed video)--can

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

An Improved Available Bandwidth Measurement Algorithm based on Pathload

An Improved Available Bandwidth Measurement Algorithm based on Pathload An Improved Available Bandwidth Measurement Algorithm based on Pathload LIANG ZHAO* CHONGQUAN ZHONG Faculty of Electronic Information and Electrical Engineering Dalian University of Technology Dalian 604

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Path Optimization in Computer Networks

Path Optimization in Computer Networks Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host

More information

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005 Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

4 High-speed Transmission and Interoperability

4 High-speed Transmission and Interoperability 4 High-speed Transmission and Interoperability Technology 4-1 Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN KUMAZOE Kazumi, KOUYAMA Katsushi, HORI Yoshiaki,

More information

Distributed monitoring of IP-availability

Distributed monitoring of IP-availability IPLU-II Seminar 08.02.2008 1 Distributed monitoring of IP-availability Jorma Kilpi, VTT February 8, 2008 IPLU-II Seminar 08.02.2008 2 Availability vs. IP-Availability In this presentation Availability

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

A Proposed Framework for Calibration of Available Bandwidth Estimation Tools

A Proposed Framework for Calibration of Available Bandwidth Estimation Tools A Proposed Framework for Calibration of Available Bandwidth Estimation Tools Joel Sommers University of Wisconsin jsommers@cs.wisc.edu Paul Barford University of Wisconsin pb@cs.wisc.edu Walter Willinger

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

Continuous One-Way Detection of Available Bandwidth Changes for Video Streaming over Best Effort Networks

Continuous One-Way Detection of Available Bandwidth Changes for Video Streaming over Best Effort Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Continuous One-Way Detection of Available Bandwidth Changes for Video Streaming over Best Effort Networks Abbas Javadtalab,

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

Bandwidth Measurement in xdsl Networks

Bandwidth Measurement in xdsl Networks Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu

More information

6.6 Scheduling and Policing Mechanisms

6.6 Scheduling and Policing Mechanisms 02-068 C06 pp4 6/14/02 3:11 PM Page 572 572 CHAPTER 6 Multimedia Networking 6.6 Scheduling and Policing Mechanisms In the previous section, we identified the important underlying principles in providing

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Knowledge Is Power: Do what s best for the client.

Knowledge Is Power: Do what s best for the client. Knowledge Is Power: Do what s best for the client. 1. Understanding Voice and Data Differences Even when they are carried on the same network, voice traffic and data traffic cannot be handled the same

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

Burst (of packets) and Burstiness

Burst (of packets) and Burstiness 66th IETF - Montreal, Quebec, Canada Burst (of packets) and Burstiness R. Krzanowski Ver 1.0 7/10/2006 1 Outline Objectives Definition of a phenomena Definition of Burst and burstiness Future research

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

MONITORING AVAILABLE BANDWIDTH OF UNDERLYING GRID NETWORKS

MONITORING AVAILABLE BANDWIDTH OF UNDERLYING GRID NETWORKS MONITORING AVAILABLE BANDWIDTH OF UNDERLYING GRID NETWORKS Marcia Zangrilli Bruce B. Lowekamp, advisor Department of Computer Science College of William and Mary Abstract Harnessing the complete power

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,

More information

Analysis of a Distributed Denial-of-Service Attack

Analysis of a Distributed Denial-of-Service Attack Analysis of a Distributed Denial-of-Service Attack Ka Hung HUI and OnChing YUE Mobile Technologies Centre (MobiTeC) The Chinese University of Hong Kong Abstract DDoS is a growing problem in cyber security.

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Elisabete Reis elreis@dei.uc.pt Polytechnic Institute of Coimbra Fernando Melo fmelor@dei.uc.pt

More information

Experiences with Interactive Video Using TFRC

Experiences with Interactive Video Using TFRC Experiences with Interactive Video Using TFRC Alvaro Saurin, Colin Perkins University of Glasgow, Department of Computing Science Ladan Gharai University of Southern California, Information Sciences Institute

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Planning Networks for VOIP. An Introduction

Planning Networks for VOIP. An Introduction Planning Networks for VOIP An Introduction Planning Networks for VOIP Page 2/10 Contents 1 Introduction...3 2 Voice Quality Requirements...3 3 Codecs...4 4 Network Layout...5 5 Planning Capacity...6 5.1

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005 Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Bandwidth Measurements in Wired and Wireless Networks

Bandwidth Measurements in Wired and Wireless Networks Mälardalen University Licentiate Thesis No.48 Bandwidth Measurements in Wired and Wireless Networks Andreas Johnsson April 2005 Department of Computer Science and Electronics Mälardalen University Västerås,

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

Active traffic monitoring for heterogeneous environments

Active traffic monitoring for heterogeneous environments Active traffic monitoring for heterogeneous environments Hélder Veiga, Teresa Pinho, José Luis Oliveira, Rui Valadas, Paulo Salvador, and António Nogueira University of Aveiro/Institute of Telecommunications

More information

COMPARATIVE EVALUATION OF AVAILABLE BANDWIDTH ESTIMATION TOOLS (PRTG AND OAUNETMON) IN A CAMPUS WIDE AREA NETWORK.

COMPARATIVE EVALUATION OF AVAILABLE BANDWIDTH ESTIMATION TOOLS (PRTG AND OAUNETMON) IN A CAMPUS WIDE AREA NETWORK. COMPARATIVE EVALUATION OF AVAILABLE BANDWIDTH ESTIMATION TOOLS (PRTG AND OAUNETMON) IN A CAMPUS WIDE AREA NETWORK. Azeez Nureni Ayofe Department of Maths & Computer Science, College of Natural and Applied

More information

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi

More information

Cisco Quality of Service and DDOS

Cisco Quality of Service and DDOS Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

Measurement of IP Transport Parameters for IP Telephony

Measurement of IP Transport Parameters for IP Telephony Measurement of IP Transport Parameters for IP Telephony B.V.Ghita, S.M.Furnell, B.M.Lines, E.C.Ifeachor Centre for Communications, Networks and Information Systems, Department of Communication and Electronic

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Evaluation and Characterization of Available Bandwidth Probing Techniques

Evaluation and Characterization of Available Bandwidth Probing Techniques IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 6, AUGUST 2003 879 Evaluation and Characterization of Available Bandwidth Probing Techniques Ningning Hu, Student Member, IEEE, and Peter

More information

1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed.

1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed. SLAC-PUB-8384 February 2000 1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed. W. Matthews, L. Cottrell, R. Nitzan Presented at International Conference On Computing In High Energy Physics And

More information

Scheduling for QoS Management

Scheduling for QoS Management Scheduling for QoS Management Domenico Massimo Parrucci Condello isti information science Facoltà and di Scienze technology e Tecnologie institute 1/number 1 Outline What is Queue Management and Scheduling?

More information

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions 1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

AVAILABLE bandwidth of a network path has long been

AVAILABLE bandwidth of a network path has long been 918 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 4, AUGUST 2007 A Queueing-Theoretic Foundation of Available Bandwidth Estimation: Single-Hop Analysis Xiliang Liu, Member, IEEE, Kaliappa Ravindran,

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information